Re: [Sidrops] adopt draft-ymbk-sidrops-rpki-has-no-identity please

Randy Bush <randy@psg.com> Thu, 25 March 2021 00:32 UTC

Return-Path: <randy@psg.com>
X-Original-To: sidrops@ietfa.amsl.com
Delivered-To: sidrops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F293B3A13BB for <sidrops@ietfa.amsl.com>; Wed, 24 Mar 2021 17:32:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4MxtKtzvN2Wg for <sidrops@ietfa.amsl.com>; Wed, 24 Mar 2021 17:32:11 -0700 (PDT)
Received: from ran.psg.com (ran.psg.com [IPv6:2001:418:8006::18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F34B3A13B7 for <sidrops@ietf.org>; Wed, 24 Mar 2021 17:32:11 -0700 (PDT)
Received: from localhost ([127.0.0.1] helo=ryuu.rg.net) by ran.psg.com with esmtp (Exim 4.90_1) (envelope-from <randy@psg.com>) id 1lPDut-00012E-CJ; Thu, 25 Mar 2021 00:32:03 +0000
Date: Wed, 24 Mar 2021 17:32:02 -0700
Message-ID: <m24kh0xed9.wl-randy@psg.com>
From: Randy Bush <randy@psg.com>
To: George Michaelson <ggm@algebras.org>
Cc: Mikael Abrahamsson <swmike@swm.pp.se>, SIDR Operations WG <sidrops@ietf.org>
In-Reply-To: <CAKr6gn2Vr-n=Nh=4ivukLWmHzM52iUWt2F=05tXcSs+M_vXYwQ@mail.gmail.com>
References: <m2ft0sgwfy.wl-randy@psg.com> <alpine.DEB.2.20.2103231615441.21528@uplift.swm.pp.se> <m2pmzpz41r.wl-randy@psg.com> <CAKr6gn2BWm0ZwuqwLc=g7FXgqbt0eqJ3tWJW7BzP=vEn6qCEcA@mail.gmail.com> <m2mtutz3s4.wl-randy@psg.com> <CAKr6gn2YM+5+3BMPUPM0O-C_VP5dprQyOyXkxvAKDhP7tfDbyQ@mail.gmail.com> <m2im5hz2qt.wl-randy@psg.com> <CAKr6gn3m6aBV_PkZQQfnEg2R5M92kfJhvGfAiu-3XW++bdR=1A@mail.gmail.com> <m2ft0lz0h3.wl-randy@psg.com> <alpine.DEB.2.20.2103240715470.21528@uplift.swm.pp.se> <m27dlwzaiz.wl-randy@psg.com> <CAKr6gn2Vr-n=Nh=4ivukLWmHzM52iUWt2F=05tXcSs+M_vXYwQ@mail.gmail.com>
User-Agent: Wanderlust/2.15.9 (Almost Unreal) Emacs/26.3 Mule/6.0 (HANACHIRUSATO)
MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue")
Content-Type: text/plain; charset="US-ASCII"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sidrops/WP4F7DDUvon3sRkpS8WNvHu9dZw>
Subject: Re: [Sidrops] adopt draft-ymbk-sidrops-rpki-has-no-identity please
X-BeenThere: sidrops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A list for the SIDR Operations WG <sidrops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sidrops>, <mailto:sidrops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sidrops/>
List-Post: <mailto:sidrops@ietf.org>
List-Help: <mailto:sidrops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sidrops>, <mailto:sidrops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 00:32:14 -0000

> You posed a MITM attack.

i did not think i described a middle for a monkey to inhabit.  when the
monkey uses its CA access credentials to cause the CA to sign some
document/object, it is the primary actor trying to fool you into
believing it is a rabbit.  so is the CA your middle?

> You instantiated it as a bank account fraud.  I tried to decompose
> your koan to identify the parties, and I draw the conclusion that the
> risk of fraud exists irrespective of the nature of the signed object,
> can be trivially instantiated from abuse of things signed, and demands
> the receiver and sender be naive respecting MITM risk, and draw false
> conclusions from the provable INR part of the signing.

i have absolutely no idea what that just said

> It is likely a ROA only harms the creator if abused.

depends on the form of abuse.  i think we have discussed a few hunred
times the problem where
  X owns 1.2.0.0/16 and announces that /16 from AS1
  X allocates 1.2.3.0/24 to their customer Y which Y announces from AS2
  neither creates a roa for 1.2.3.0/24-AS2
  X creates a roa for 1.2.0.0/16-AS1
  customer's announcement of 1.2.3.0/24-AS2 is now invalid

i.e. X's roa creation harms their customer, Y

> There is a risk an RTA or RSC signed statement harms the receiver or
> some third party.

like a roa, only if they foolishly believe it applies to anything other
than the inrs whose certs were used to sign the statement/roa.

> If the transaction is like BYOip, and the receiver defines the form of
> data to be signed and some suitable nonce or hash to be over-signed, I
> think its starting to look safer.

i am not sure what over-signing means.  but yes, if i can convince a CA
to sign something using the key for some inr, then you can probably
trust that something to speak for that inr.  e.g. if you sign a document
with the key for AS42, you can probably trust what it says about AS42;
although not anything about the unidentified 'owner' of AS42 or her
wife.

> I believe we all agree the RPKI does not prove identity.

i said nothing about prove.  imiho, the rpki can not authenticate real
world identities at all beyond than the inrs in the 3779 glorp.  this is
not supposed to be a complex concept.

> I would say that use of RTA and RSC, is to bridge signed provable
> assertions about INR, to some other space. What that space is, and how
> it is proved, lies between the receiver and the sender (of that
> bridged, signed assertion).

and if you believe that, i have this bridge

> Ideally defining new signed object types would be easy. I don't think
> it is, the initial proposing is fine, its closure to a registry in
> process which takes forever.

i have no idea what that means.  i think we have all had the fun of
defining a new object type, see RFC6488

> RTA and RSC also help bootstrap ideas which probably emerge as
> specific ASN1 defined objects with structure fit for purpose.

> There is an argument to be made that the hard test of what should be
> in the ASN1 and what it means is the necessary cost to avoiding risk
> like the MITM threat.

lost me again; but the bar is low

are you trying to say that rta and rsc are low cost hacks for avoiding
the pain of making 6488 derivative rfcs?

maybe so.  as long as we keep in mind that those hacks only authenticate
statements about the INRs whose certs were used to sign.

randy